Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 01:54
Behavioral task
behavioral1
Sample
bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a.exe
Resource
win10v2004-20240226-en
General
-
Target
bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a.exe
-
Size
178KB
-
MD5
7ca73a6280a865d79da8a98e9009016a
-
SHA1
62a1de8ff8c5f65cd8ae652fa7df50aa29410d03
-
SHA256
bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a
-
SHA512
990864fe2cdbefddf2a2a2b08a12131b428a761cbc1f0a1a3dfe39657184b8ec762994e52214c7d2b4bb0bef4e2c8c40aeab4af7ffbe4fe6e964ee245c6ecb54
-
SSDEEP
3072:SxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvdqkzk6t55G:U2pdqfv2IPOGfXf5ovWvdNk6r5G
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2856-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0007000000015e5d-4.dat upx behavioral1/memory/2856-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\driv64.exe bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD57ca73a6280a865d79da8a98e9009016a
SHA162a1de8ff8c5f65cd8ae652fa7df50aa29410d03
SHA256bdc4912eb60b938eacbecb90a10ce06b2bfdda508600b3cc98a8f1d89cb2827a
SHA512990864fe2cdbefddf2a2a2b08a12131b428a761cbc1f0a1a3dfe39657184b8ec762994e52214c7d2b4bb0bef4e2c8c40aeab4af7ffbe4fe6e964ee245c6ecb54